CVE-2025-30202: Data exposure via ZeroMQ on multi-node vLLM deployment
(updated )
In a multi-node vLLM deployment, vLLM uses ZeroMQ for some multi-node communication purposes. The primary vLLM host opens an XPUB
ZeroMQ socket and binds it to ALL interfaces. While the socket is always opened for a multi-node deployment, it is only used when doing tensor parallelism across multiple hosts.
Any client with network access to this host can connect to this XPUB
socket unless its port is blocked by a firewall. Once connected, these arbitrary clients will receive all of the same data broadcasted to all of the secondary vLLM hosts. This data is internal vLLM state information that is not useful to an attacker.
By potentially connecting to this socket many times and not reading data published to them, an attacker can also cause a denial of service by slowing down or potentially blocking the publisher.
References
- github.com/advisories/GHSA-9f8f-2vmf-885j
- github.com/vllm-project/vllm
- github.com/vllm-project/vllm/commit/a0304dc504c85f421d38ef47c64f83046a13641c
- github.com/vllm-project/vllm/pull/17197
- github.com/vllm-project/vllm/pull/6183
- github.com/vllm-project/vllm/security/advisories/GHSA-9f8f-2vmf-885j
- nvd.nist.gov/vuln/detail/CVE-2025-30202
Code Behaviors & Features
Detect and mitigate CVE-2025-30202 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →